Title |
Conference |
Tags |
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M |
Black Hat USA-2022 - Las Vegas, NV |
Cyber-Physical Systems
Hardware / Embedded
|
V0LTpwn: Attacking x86 Processor Integrity from Software |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Peek-a-Boo: I see your smart home activities, even encrypted! |
ACMConference-2020 - Virtual, Virtual |
|
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization |
ACSAC2019-2019 - San Juan, Puerto Rico |
|
PAtt: Physics-based Attestation of Control Systems |
RAID2019-2019 - Beijing, China |
|
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
K-Miner: Uncovering Memory Corruption in Linux. |
NDSS-2018 - san diego,usa |
|
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory |
usenixsecurity-2017 - vancouver,canada |
|
Software Grand Exposure: SGX Cache Attacks Are Practical |
woot-2017 - vancouver,canada |
|
Pushing the Communication Barrier in Secure Computation using Lookup Tables |
NDSS-2017 - california,usa |
|
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables |
NDSS-2017 - california,usa |
|
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit |
NDSS-2017 - california,usa |
|
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity |
NDSS-2017 - california,usa |
|
TOWARDS A POLICY-AGNOSTIC CONTROL-FLOW INTEGRITY IMPLEMENTATION |
BlackHatEU-2016 - London,uk |
|
Selfrando: Securing the Tor Browser against De-anonymization Exploits |
PETS-2016 - darmstadt,germany |
|
DARPA: Device Attestation Resilient to Physical Attacks |
WiSec-2016 - darmstadt,germany |
|
Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments |
WiSec-2016 - darmstadt,germany |
|
Toward a Secure and Scalable Attestation |
WiSec-2016 - darmstadt,germany |
|
Leakage-Resilient Layout Randomization for Mobile Devices |
NDSS-2016 - california,usa |
|
RETURN TO WHERE? YOU CANT EXPLOIT WHAT YOU CANT FIND |
BlackhatUS-2015 - Las vegas,usa |
|
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming |
NDSS-2015 - san diego,usa |
|
Swap and Play: Live Updating Hypervisors and Its Application to Xen |
CCSW-2014 - Arizona,USA |
|
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices |
CCS-2014 - Scottsdale,USA |
|
ASM: A Programmable Interface for Extending Android Security |
usenix-2014 - san diego,usa |
|
THE BEAST IS IN YOUR MEMORY: RETURN-ORIENTED PROGRAMMING ATTACKS AGAINST MODERN CONTROL-FLOW INTEGRITY PROTECTION TECHNIQUES |
BlackHatUS-2014 - las vegas,usa |
|
Special Session on Hardware-entangled Primitives: PUFs and More |
Trust-2014 - Crete,Greece |
|
ConXsense - Automated Context Classification for Context-Aware Access Control |
asiaccs-2014 - kyoto,japan |
|
TrustLite: A Security Architecture for Tiny Embedded Devices |
EuroSys-2014 - Amsterdam,Netherlands |
|
Authentication and Visual Encryption |
FinanCryptandInfoSec-2014 - Accra,Barbados |
|
Do I know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications |
ACSAC-2013 - New Orleans, USA |
|
Mobile Networks and Apps |
ACSAC-2013 - New Orleans, USA |
|
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies |
USENIX-2013 - Washington, D.C. |
|
Location and Permission |
MOST-2013 - San Francisco,USA |
Security
|
PSiOS: Bring Your Own Privacy & Security to iOS Devices |
ASIACCS-2013 - Hangzhou,China |
|
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM |
ASIACCS-2013 - Hangzhou,China |
|
Session 1: Mobile Device and Application Security |
WiSec-2013 - Budapest,Hungary |
Security
|
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs |
Financial Cryptography and Data Security-2013 - Bonaire,Netherlands |
|
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm |
Financial Cryptography and Data Security-2013 - Bonaire,Netherlands |
|
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer |
Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA |
|
"The Quest for Trusted Computing: Promises, Expectations, Practice, and Challenges", |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
Security
|
Converse PUF-based Authentication |
5th International Conference on Trust & Trustworthy Computing-2012 - Vienna, Austria |
|
SmartTokens: Delegable Access Control with NFC-enabled Smartphones |
5th International Conference on Trust & Trustworthy Computing-2012 - Vienna, Austria |
|
Twin Clouds: Secure Cloud Computing with Low Latency |
CMS-2011 - Ghent, Belgium |
|
Hardware, SCADA, and physical security |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
Security
|
AmazonIA: When Elasticity Snaps Back |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
"The Quest for Trusted Computing: Promises, Expectations, Practice, and Challenges", |
dimva-2011 - Amsterdam,Netherkands |
|